ALT-BU-2019-3992-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2019-04705
Уязвимость реализации протокола маршрутизации пакетов в Unix-подобных операционных системах bird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16159
BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.
- http://bird.network.cz
- http://bird.network.cz
- openSUSE-SU-2019:2178
- openSUSE-SU-2019:2178
- openSUSE-SU-2019:2180
- openSUSE-SU-2019:2180
- http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html
- http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html
- http://trubka.network.cz/pipermail/bird-users/2019-September/013720.html
- http://trubka.network.cz/pipermail/bird-users/2019-September/013720.html
- http://trubka.network.cz/pipermail/bird-users/2019-September/013722.html
- http://trubka.network.cz/pipermail/bird-users/2019-September/013722.html
- https://gitlab.labs.nic.cz/labs/bird/commit/1657c41c96b3c07d9265b07dd4912033ead4124b
- https://gitlab.labs.nic.cz/labs/bird/commit/1657c41c96b3c07d9265b07dd4912033ead4124b
- https://gitlab.labs.nic.cz/labs/bird/commit/8388f5a7e14108a1458fea35bfbb5a453e2c563c
- https://gitlab.labs.nic.cz/labs/bird/commit/8388f5a7e14108a1458fea35bfbb5a453e2c563c
- FEDORA-2019-ace80f492e
- FEDORA-2019-ace80f492e
- FEDORA-2019-b629e3b97f
- FEDORA-2019-b629e3b97f
- 20190920 [SECURITY] [DSA 4528-1] bird security update
- 20190920 [SECURITY] [DSA 4528-1] bird security update
- DSA-4528
- DSA-4528
Closed vulnerabilities
BDU:2019-00984
Уязвимость модуля ngx_http_mp4_module сервера nginx, позволяющая нарушителю вызвать отказ в обслуживании или раскрыть защищаемую информацию
BDU:2019-02994
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02997
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, сетевых программных средств Envoy, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03638
Уязвимость реализации сетевого протокола HTTP/2 сервера nginx, программной платформы Node.js, сетевого программного средства SwiftNIO, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03782
Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16845
nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
- openSUSE-SU-2019:2120
- openSUSE-SU-2019:2120
- http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html
- http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html
- 20210921 APPLE-SA-2021-09-20-4 Xcode 13
- 20210921 APPLE-SA-2021-09-20-4 Xcode 13
- 105868
- 105868
- 1042039
- 1042039
- RHSA-2018:3652
- RHSA-2018:3652
- RHSA-2018:3653
- RHSA-2018:3653
- RHSA-2018:3680
- RHSA-2018:3680
- RHSA-2018:3681
- RHSA-2018:3681
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845
- [debian-lts-announce] 20181108 [SECURITY] [DLA 1572-1] nginx security update
- [debian-lts-announce] 20181108 [SECURITY] [DLA 1572-1] nginx security update
- https://support.apple.com/kb/HT212818
- https://support.apple.com/kb/HT212818
- USN-3812-1
- USN-3812-1
- DSA-4335
- DSA-4335
Modified: 2025-01-14
CVE-2019-9511
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2120
- openSUSE-SU-2019:2232
- openSUSE-SU-2019:2234
- openSUSE-SU-2019:2264
- RHSA-2019:2692
- RHSA-2019:2745
- RHSA-2019:2746
- RHSA-2019:2775
- RHSA-2019:2799
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2949
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3041
- RHSA-2019:3932
- RHSA-2019:3933
- RHSA-2019:3935
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- FEDORA-2019-4427fd65be
- FEDORA-2019-8a437d5c2f
- FEDORA-2019-81985a8858
- FEDORA-2019-7a0b45fdc4
- FEDORA-2019-befd924cfe
- FEDORA-2019-63ba15cc83
- 20190822 [SECURITY] [DSA 4505-1] nginx security update
- 20190902 [SECURITY] [DSA 4511-1] nghttp2 security update
- https://security.netapp.com/advisory/ntap-20190823-0002/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K02591030
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS
- USN-4099-1
- DSA-4505
- DSA-4511
- DSA-4669
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2115
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- DSA-4669
- DSA-4511
- DSA-4505
- USN-4099-1
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K02591030
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0002/
- 20190902 [SECURITY] [DSA 4511-1] nghttp2 security update
- 20190822 [SECURITY] [DSA 4505-1] nginx security update
- FEDORA-2019-63ba15cc83
- FEDORA-2019-befd924cfe
- FEDORA-2019-7a0b45fdc4
- FEDORA-2019-81985a8858
- FEDORA-2019-8a437d5c2f
- FEDORA-2019-4427fd65be
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3935
- RHSA-2019:3933
- RHSA-2019:3932
- RHSA-2019:3041
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2949
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2799
- RHSA-2019:2775
- RHSA-2019:2746
- RHSA-2019:2745
- RHSA-2019:2692
- openSUSE-SU-2019:2264
- openSUSE-SU-2019:2234
- openSUSE-SU-2019:2232
- openSUSE-SU-2019:2120
- openSUSE-SU-2019:2114
Modified: 2025-01-14
CVE-2019-9513
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2120
- openSUSE-SU-2019:2232
- openSUSE-SU-2019:2234
- openSUSE-SU-2019:2264
- RHSA-2019:2692
- RHSA-2019:2745
- RHSA-2019:2746
- RHSA-2019:2775
- RHSA-2019:2799
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2949
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3041
- RHSA-2019:3932
- RHSA-2019:3933
- RHSA-2019:3935
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-8a437d5c2f
- FEDORA-2019-81985a8858
- FEDORA-2019-7a0b45fdc4
- FEDORA-2019-befd924cfe
- 20190822 [SECURITY] [DSA 4505-1] nginx security update
- 20190902 [SECURITY] [DSA 4511-1] nghttp2 security update
- https://security.netapp.com/advisory/ntap-20190823-0002/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K02591030
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS
- USN-4099-1
- DSA-4505
- DSA-4511
- DSA-4669
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2115
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- DSA-4669
- DSA-4511
- DSA-4505
- USN-4099-1
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K02591030
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0002/
- 20190902 [SECURITY] [DSA 4511-1] nghttp2 security update
- 20190822 [SECURITY] [DSA 4505-1] nginx security update
- FEDORA-2019-befd924cfe
- FEDORA-2019-7a0b45fdc4
- FEDORA-2019-81985a8858
- FEDORA-2019-8a437d5c2f
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2019:3935
- RHSA-2019:3933
- RHSA-2019:3932
- RHSA-2019:3041
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2949
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2799
- RHSA-2019:2775
- RHSA-2019:2746
- RHSA-2019:2745
- RHSA-2019:2692
- openSUSE-SU-2019:2264
- openSUSE-SU-2019:2234
- openSUSE-SU-2019:2232
- openSUSE-SU-2019:2120
- openSUSE-SU-2019:2114
Modified: 2025-01-14
CVE-2019-9516
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2120
- openSUSE-SU-2019:2264
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- RHSA-2019:2745
- RHSA-2019:2746
- RHSA-2019:2775
- RHSA-2019:2799
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2946
- RHSA-2019:2950
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3932
- RHSA-2019:3933
- RHSA-2019:3935
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- FEDORA-2019-6a2980de56
- FEDORA-2019-4427fd65be
- FEDORA-2019-5a6a7bc12c
- FEDORA-2021-d5b2c18fe6
- FEDORA-2019-7a0b45fdc4
- FEDORA-2019-befd924cfe
- FEDORA-2019-63ba15cc83
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190822 [SECURITY] [DSA 4505-1] nginx security update
- https://security.netapp.com/advisory/ntap-20190823-0002/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K02591030
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS
- USN-4099-1
- DSA-4505
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2115
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4505
- USN-4099-1
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K02591030
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0002/
- 20190822 [SECURITY] [DSA 4505-1] nginx security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-63ba15cc83
- FEDORA-2019-befd924cfe
- FEDORA-2019-7a0b45fdc4
- FEDORA-2021-d5b2c18fe6
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-4427fd65be
- FEDORA-2019-6a2980de56
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2019:3935
- RHSA-2019:3933
- RHSA-2019:3932
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2950
- RHSA-2019:2946
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2799
- RHSA-2019:2775
- RHSA-2019:2746
- RHSA-2019:2745
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2264
- openSUSE-SU-2019:2120
- openSUSE-SU-2019:2114
Closed vulnerabilities
BDU:2019-04712
Уязвимость DNS-сервера Unbound, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16866
Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.
- https://github.com/NLnetLabs/unbound/blob/release-1.9.4/doc/Changelog
- https://github.com/NLnetLabs/unbound/blob/release-1.9.4/doc/Changelog
- FEDORA-2019-e99b716a92
- FEDORA-2019-e99b716a92
- FEDORA-2019-0418c12a36
- FEDORA-2019-0418c12a36
- https://nlnetlabs.nl/downloads/unbound/CVE-2019-16866.txt
- https://nlnetlabs.nl/downloads/unbound/CVE-2019-16866.txt
- 20191016 [SECURITY] [DSA 4544-1] unbound security update
- 20191016 [SECURITY] [DSA 4544-1] unbound security update
- USN-4149-1
- USN-4149-1
- DSA-4544
- DSA-4544
Closed vulnerabilities
Modified: 2024-11-21
CVE-2012-2663
extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.
Closed bugs
Обновить iptables до версии > 1.6.0